Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

There’s nothing software-defined about your network! Every time I see the term ‘software-defined network’ I cringe. A network isn’t software-defined. Sure, it can be operationalized – virtualized, made more intelligent, agile – but that’s the...
On Tuesday the 27th of January we announced the introduction of F5's BIG-IQ management platform to our Cisco APIC integration - the original integration being direct between APIC and the F5 application delivery controller (ADC). On...
I wrap it up from Mobile World Congress 2015. Thanks to you for watching and thanks to our guests this week including Frank Yue, Jonathan George, Peter Nas, Ron Carovano, Richard Duncan, Misbah Mahmoodi and a very special Mahalo to F5 CEO John...
Please find the English language post from which this was adapted here. 아시아태평양지역 클라우드의 현주소 – 세 번째 이 글은 아시아태평양지역에서의 클라우드에 대하여 살펴보는 시리즈의 세 번째 글이다. 이 글에서는 지역 내 클라우드의 현주소, 클라우드가 어떻게 사용되고 있는지, 무엇이 클라우드가 더 확산되는 것을 막고 있는지, 그리고 클라우드가 어떻게 혁신을 위해 사용될...
"Speedy Gonzales (1955 short)" by Source (WP:NFCC#4) #MWC15 I was at a restaurant with some colleagues after the day of Mobile World Congress events today in Barcelona. Unfortunately, all the Spanish I learned was from the Warner Bro...
With so many new and varied devices such as smartphones, smartwatches, laptops, and tablets accessing a service provider network, with a 2.9 device per-person average worldwide according to a Sophos survey, it’s no wonder there is Operator...
This post is cross-posted at https://blogs.cisco.com/datacenter/how-you-integrate-network-services-matters Polymorphism is a concept central to object-oriented programming. The notion of polymorphism is used to extend the capabilities of a basi...
Getting FREAK-y with BIG-IP
article
Since it’s been about 3 months since POODLE, we’re clearly overdue for another major vulnerability in SSL and/or TLS. Fortunately for us, the research team at SmackTLS has released details of the FREAK attack (aka OpenSSL CVE-2015-0204). We...
Given this year’s MWC theme is “The Edge of Innovation”, it’s no wonder that several new mobile phone made their debut this week—accompanied by a slew of new capabilities aimed at grabbing both analyst and subscriber attention. Microsoft announced...
John McAdam, F5 President & CEO talks about what the mobile revolution means to F5. John discusses how mobile technology is driving innovation, why the need for intelligent application traffic management is critical, how F5 is in the sweet...
Jason continues the series of whiteboard sessions on Global Traffic Manager load balancing, covering the topology algorithm at the wideIP level. Resources About Global Server Load Balancing (Manual) Overview of BIG-IP GTM Topology Records ...
Misbah Mahmoodi, Sr. Product Marketing Manager, does a great job explaining the service provider challenges with the exponential growth in data usage from a subscriber point of view. For mobile operators, one of the worst things that subscribers...
Frank Yue, Sr. Technical Marketing Manager, visits again to talk about the unique challenges service providers face in managing mobile data traffic. As more devices are generating more traffic, congestion can create bottlenecks on a carrier’s...
Since the very early days of 2G and 3G deployments, mobile operators from all around the world have been deploying and using content optimization platforms. The reasons for deploying these technologies were pretty straightforward. Bandwidth at the...
Since the very early days of 2G and 3G deployments, mobile operators from all around the world have been deploying and using content optimization platforms. The reasons for deploying these technologies were pretty straightforward. Bandwidth at the...
#MWC15 Barcelona is a great city, but with 100,000 people coming to the city for Mobile World Congress, it is expected that the criminals will come in force to prey upon these unwary travelers. When I travel, I am careful to protect myself from...
Guest Blog by Jay Kelly, Senior Product Marketing Manager #MWC15 I believe that we can all agree that mobility is exploding, can’t we? According to an IDC report, the worldwide mobile workforce is expected to reach 1.3 billion people by the end of...
The following provides guidance on the configuration of BIG-IP Local Traffic Manager and Access Policy Manager in support of Apache Web Server Smartcard / Kerberos access using Active Directory as the Key Distribution Center.  This content is...
With an industry full of TLAs (three letter acronyms) Richard Duncan, Sr. Manager Systems Engineering, gives a wonderful explanation of SDN using the universal TV remote example. In this fun interview, Richard demystifies SDN and explains how SDN...
Ron Carovano, Manager, Business Development, joins us from the F5 kiosk in the AirWatch Connect booth at #MWC15. Always a fun and informative guest, Ron fills us in on the F5/AirWatch partnership and how our joint solution helps an employee with...
Peter Nas, Sr. Solution Architect, explains what happens when the many MWC attendees from all over the world arrive in Barcelona and need to connect their mobile devices to a carrier network. Peter does a great job walking us through what happens...
Please find the English language post from which this was adapted here. Konsep apapun berbasis software / software-defined; mulai dari Software Defined Networking (SDN), Software Defined Storage (SDS), dan bahkan meluas hingga Software Defined...
#MWC15 I enjoy coming to Barcelona every year for Mobile World Congress. On one hand, the show is overwhelming with the number of attendees and back to back meetings I have when I am here. But on the other hand, I get to experience and enjoy the...
The most prevalent use cases that F5 is observing in most of the POCs include VNF as a Service (VNFaaS) , Service Chaining, vEPC, vCPE and vRAN.  F5 itself is actively involved in VNFaaS, Service Chaining and vEPC use cases, in customer POCs....
Jonathan George, Sr. Product Marketing Manager, talks about the various threats that can occur on a carrier network. Mobile devices are becoming a hot target for malicious attacks and users may not be aware that they have potentially become part...